Understand the AppLocker Policy Deployment Process
Updated: June 21, 2012
Applies To: Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2012, Windows 8
This planning and deployment topic for the IT professional describes the process for using AppLocker when deploying application control policies.
To successfully deploy AppLocker policies, you need to identify your application control objectives and construct the policies for those objectives. The key to the process is taking an accurate inventory of your organization's applications, which requires investigation of all the targeted business groups. With an accurate inventory, you can create rules and set enforcement criteria that will allow the organization to use the required applications and allow the IT department to manage a controlled set of applications.
The following diagram shows the main points in the design, planning, and deployment process for AppLocker.
The following documentation contains information about designing, planning, deploying, and maintaining AppLocker policies:
For information about the AppLocker policy design and planning requirements and process, see AppLocker Policies Design Guide.
For information about the AppLocker policy deployment requirements and process, see AppLocker Policies Deployment Guide.
For information about AppLocker policy maintenance and monitoring for Windows Server 2008 R2 and Windows 7, see AppLocker Operations Guide.
For information about AppLocker policy maintenance and monitoring in versions of Windows later than Windows Server 2008 R2 and Windows 7, see Administer AppLocker.
For information about AppLocker policy architecture, components, and processing, see AppLocker Technical Reference.